Training Day Session 1A: Cisco: Making Pervasive Video a Reality by John Horne

With more robust networks in place videoconferencing is becoming a viable communications solution for organizations of all sizes. Users can now add video to an existing audio call with a single click. Whether you’re on an office phone or a smart phone the actual tool matters less than the impact videoconferencing can have on your organization’s productivity and performance. Access to any meeting with any device from anywhere is possible with cutting-edge collaboration technology.

As we move to this world of digital transformation things are going to be very different. If you take a look back at the last 10 years, technology was really the power of the personal PC, very much focused on running traditional applications without the need of servers, now we are realizing that the pendulum has swung too far away from centralized processing. During this session you will be able to listen and ask questions to a panel of Dell experts on the deployment, optimization and design of VDI in the DoD and Government at large.

Your perimeter is well protected by your firewall, IPS, Email and Web Security solutions, but how do you secure access to your intranet and identify an anomalous behavior? You can’t protect what you can’t see. Understand how to protect access to your network and provide an automated threat response by using your network as a sensor.

With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history. In this session, learn about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats. Learn how to: stay safe from ransomware and other advanced attacks, practice good security hygiene, and use trusted automated tools to protect your network and endpoints

Orchestrating effective security operations has proven to be a difficult task, even with a mature cyber security posture. The multitude of technologies, regular staff rotations and training deficiencies have all impacted an organization’s ability to identify and disrupt complex attacks. On top of that, staff must handle and leverage a variety of internal and external threat intelligence to help effectively detect, analyze, repair affected systems and adapt to future attacks. Talk about a challenge! In this session, we will discuss strategies you can use to shrink the problem down into a manageable model and demonstrate some technology that will help you do it.

Training Day Session 4B: TBD

12:30-13:20

G

Training Day Session 5A: Dell EMC: End Point Security Best Practices by Mark “Doc” Gaborik

With the growing need for Cyber Security across all our connections, Endpoint Security can be the biggest help to secure any Network. Understanding the requirements and the different capabilities, available and new to the Market, will provide solutions for closing the gap on the weakest link in any system regardless of the Location or Domain.

Training Day Session 5B: Self-Learning Defense – Identifying Early-Stage Threats with an Enterprise Immune System by John Kirch

Today’s evolving threats demand a new approach to cyber-defense. Learn about technology from Darktrace that uses unsupervised machine learning to understand an organization’s ‘pattern of life’—without rules or signatures—and when to fight back. The presentation includes examples of real-world threat detected by the Enterprise Immune System across 2,000 deployments across the world and then followed by a live demo.

DISA has purchased 1.9 million seats of McAfee’s dynamic whitelisting application for Windows operating systems. What is dynamic whitelisting and how does that help me protect both tactical and garrison systems? We will discuss McAfee Application Control and Change Control features and functionality. We will go over ePO integration, dynamic trust models, rule sets, policies, installation, and best practices.

The Air Force Cyber College’s roundtable brings together leaders and cyber experts to discuss national security and military operations in cyberspace at the strategic and doctrinal levels. Participants: 1) Focus on broad structural frameworks within which to confidently identify thresholds for response, 2) Build trusted relationships amongst stakeholders for new-style partnerships for national security in cyberspace, 3) Foster innovative private/public cooperative approaches for national security, 4) Identify emerging social and political trends influencing the future of cyberspace, and 5) Provide policy recommendations to inform on improvements in our ability to defend the nation.

Packet capture tools such as Wireshark or Tshark are great for analyzing local interface traffic, but how exactly do you capture packets on a network? There’s a range of approaches from Layer-1 optical TAPs to Smart SPAN protocols and everything in between. We dig into the various pros and cons of each approach using FMADIO 100% line rate 100G, 40G and 10G packet capture system.